General

  • Target

    4412-250-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    1b390ad276fcd1f9f5fa0e0aec95ef5e

  • SHA1

    a73ac67e7e549e31216fd7facb315de11d8ba950

  • SHA256

    aa8d9825c65e69098cbd300903df494a692166123b6b776a57915effe9bf0908

  • SHA512

    2092ac80fe877c3e326a2bedb5cb1117add00717436389730ccf4556c5d90596965c6d8352e2911c690f8e05361fd625be84a690acab05a0a36c285a3a388adb

  • SSDEEP

    3072:Yzj8puAR314bMCTNvXfocHN62/739hQcEkw8si:BuIlytvpH5Z+c0f

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.kamen.si
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Motherland23@

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4412-250-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections